Font Size: a A A

Genetic Algorithm In Intelligent Intrusion Detection System

Posted on:2007-03-17Degree:MasterType:Thesis
Country:ChinaCandidate:X L XuFull Text:PDF
GTID:2208360182993173Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With rapid development of computer network technology, the information industry and its applications have made tremendous progress. There is increasing dependence on network for individual users and enterprise units, such as governments, financial institutions, telecom industry, etc. On the other hand, this development brings potential troubles for information security. The attacking tools of network "hackers" are more and more advanced, and information security has become increasingly acute. The use of anti-attack firewall technology has not been able to resist malicious intrusion. So one solution to the issues of information security is to research on intrusion detection technology.At present, network security technology mainly includes encryption technology, identity verification technology, access control technology and firewall technology, etc. Unfortunately, there are more limitation and insufficiency. The development of intrusion detection technology can make up some deficiencies in a way. For example, intrusion detection system is initiative. It can identify the malicious use of computer and network resources, and then provide important information to confront intrusion. It can not only check the external intrusion, but monitor the unauthorized action by the internal users.Intrusion detection analysis technology is the core of the intrusion detection system. Aiming at the high rate of failing to report and distorting the intrusion affairs in intrusion detection system, this paper propose a misuse detection model on the basis of genetic algorithms. It applies the genetic algorithms to the intrusion detection technology, realizing an organic combination of genetic algorithms and intrusion detection technology. It also probes into the applications of genetic algorithms to intelligent intrusion detection technology, and makes particular discussion on its specific process and the calculation methods of various parameters, especially the application of chromosome crossover andmutation. This algorithm codes the network connection information, and simultaneously considers the space and time information, in order to check complicated intrusion actions.
Keywords/Search Tags:Network Security, IDS, Gene Algorithm, Chromosome
PDF Full Text Request
Related items